A Comprehensive Overview of Cryptography in One Hour - Colin Percival
Cryptography is complex. It typically requires years of study to grasp its intricacies. This session aims to condense essential knowledge about cryptography into a concise, one-hour format.

Polyglot Software Association
5.7K views • Dec 26, 2014

About this video
Everything you need to know about cryptography in 1 hour
Cryptography is hard. It usually takes many years of study before it is possible to make any serious contribution to the field; and even expert cryptographers often have flaws discovered in their work.
However, merely using cryptography requires far less expertise. In this talk, I will cover everything most software developers will ever need to know about cryptography -- starting from the very beginning -- along with (time allowing) some of the reasons behind the recommendations I provide.
Specific topics covered will include symmetric vs. asymmetric encryption; symmetric vs. asymmetric signatures; block ciphers; block cipher modes; key lengths; message authentication codes; hash algorithms; password handling; padding for asymmetric encryption; padding for asymmetric signing; Diffie-Hellman groups; and side channel attacks. Specific attacks will be discussed only to the extent of mentioning that they exist and explaining how cryptography-using systems should be designed to thwart them.
About Colin Percival
Dr. Colin Percival is a Security Officer Emeritus of the FreeBSD Project and the founder of the Tarsnap online backup service. In his spare time he attempts to improve the use of cryptography in software, both through novel cryptographic research and by attempting to educate the software developing public about the proper use of cryptography. He is also creator of the scrypt key derivation algorithm.
Cryptography is hard. It usually takes many years of study before it is possible to make any serious contribution to the field; and even expert cryptographers often have flaws discovered in their work.
However, merely using cryptography requires far less expertise. In this talk, I will cover everything most software developers will ever need to know about cryptography -- starting from the very beginning -- along with (time allowing) some of the reasons behind the recommendations I provide.
Specific topics covered will include symmetric vs. asymmetric encryption; symmetric vs. asymmetric signatures; block ciphers; block cipher modes; key lengths; message authentication codes; hash algorithms; password handling; padding for asymmetric encryption; padding for asymmetric signing; Diffie-Hellman groups; and side channel attacks. Specific attacks will be discussed only to the extent of mentioning that they exist and explaining how cryptography-using systems should be designed to thwart them.
About Colin Percival
Dr. Colin Percival is a Security Officer Emeritus of the FreeBSD Project and the founder of the Tarsnap online backup service. In his spare time he attempts to improve the use of cryptography in software, both through novel cryptographic research and by attempting to educate the software developing public about the proper use of cryptography. He is also creator of the scrypt key derivation algorithm.
Video Information
Views
5.7K
Likes
74
Duration
01:53:31
Published
Dec 26, 2014
User Reviews
4.4
(1) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.